WordPress 4.6 Vulnerability – Update Now

WordPress has released an update for the commonly used Content Management System – WordPress 4.6.1 fixed two vulnerabilities detailed in WPScan Vulnerability Database.

There are also 15 additional bugs fixed in the WordPress 4.6.1 release as detailed here:

Summary

From the WordPress 4.6.1 release post: WordPress versions 4.6 and earlier are affected by two security issues: a cross-site scripting vulnerability via image filename, reported by SumOfPwn researcher Cengiz Han Sahin; and a path traversal vulnerability in the upgrade package uploader, reported by Dominik Schilling from the WordPress security team.

WordPress 4.6.1 also fixes 15 bugs from Version 4.6, including:

Bootstrap/Load

  • #37680 – PHP Warning: ini_get_all() has been disabled for security reasons

Database

  • #37683 – $collate and $charset can be undefined in wpdb::init_charset()
  • #37689 – Issues with utf8mb4 collation and the 4.6 update

Editor

  • #37690 – Backspace causes jumping

Email

  • #37736 – Emails fail on certain server setups

External Libraries

  • #37700 – Warning: curl_exec() has been disabled for security reasons (Requests library)
  • #37720 – The minified version of the Masonry shim was not updated in #37666 (Masonry library)

HTTP API

  • #37733 – cURL error 3: malformed for remote requests
  • #37768 – HTTP API no longer accepts integer and float values for the cookies argument

Post Thumbnails

  • #37697 – Strange behavior with thumbnails on preview in 4.6

Script Loader

  • #37800 – Close “link rel” dns-prefetch tag

Taxonomy

  • #37721 – Improve error handling of is_object_in_term in taxonomy.php

Themes

  • #37755 – Visual Editor: Weird unicode (Vietnamese) characters display on WordPress 4.6

TinyMCE

Upgrade/Install

  • #37731 – Infinite loop in _wp_json_sanity_check() during plugin install

Ready for the right solutions?

It’s time to offload your technology troubles and security stress.

"*" indicates required fields